** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in forcedotcom SalesforceMobileSDK-Windows up to 4.x. It has been rated as critical. This issue affects the function ComputeCountSql of the file SalesforceSDK/SmartStore/Store/QuerySpec.cs. The manipulation leads to sql injection. Upgrading to version 5.0.0 is able to address this issue. The name of the patch is 83b3e91e0c1e84873a6d3ca3c5887eb5b4f5a3d8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217619. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.217619 | Permissions Required Third Party Advisory |
https://github.com/forcedotcom/SalesforceMobileSDK-Windows/commit/83b3e91e0c1e84873a6d3ca3c5887eb5b4f5a3d8 | Patch Third Party Advisory |
https://vuldb.com/?id.217619 | Permissions Required Third Party Advisory |
https://github.com/forcedotcom/SalesforceMobileSDK-Windows/releases/tag/v5.0.0 | Release Notes Third Party Advisory |
Configurations
Information
Published : 2023-01-07 05:15
Updated : 2023-01-12 11:00
NVD link : CVE-2016-15012
Mitre link : CVE-2016-15012
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
salesforce
- mobile_software_development_kit